Comprehensive X.509 certificate structure analysis, chain of trust visualization, and certificate revocation processes.
Defines the time period during which the certificate is valid
Contains the public key of the certificate owner and algorithm information
Specifies the algorithm used to sign the certificate
Identifies the CA that issued and signed the certificate
Additional fields providing extra functionality and constraints
Root CA
Example Root CA
Intermediate CA
Example Intermediate CA
End Entity
example.com
Self-signed root certificate that anchors the trust chain
Issued by Root CA, signs end-entity certificates
Server certificate for the actual service
The certificate's private key has been exposed, stolen, or otherwise compromised
Server hacked and private key file extracted
The CA that issued the certificate has been compromised
CA's private signing key stolen
The certificate subject's identity or information has changed
Company name change or domain ownership transfer
Certificate no longer needed or security policy requires revocation
Server decommissioned or security audit findings
Certificate was issued incorrectly or contains errors
Wrong domain name or organizational information